General
-
Target
009274965.lnk
-
Size
2KB
-
Sample
241231-kffpcsvjel
-
MD5
7f070dfbaa6893bb2effac0f2320a1d7
-
SHA1
293e7f6f6e70a0c7699215b3402dc5ff2bb2bfaa
-
SHA256
aeed70a3f936b699e93f18dfc5b4a582a6a08be7d52d8e6229754f96205aecb2
-
SHA512
720b2a90dd051160aeaa1a11a70433213b96f04e8d160c55c699f4fd6af7f1c07db61e110e684d9ce91ad79e987bd809497eb2d52ac2f3bd96cdb289c443b883
Static task
static1
Behavioral task
behavioral1
Sample
009274965.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
009274965.lnk
Resource
win10v2004-20241007-en
Malware Config
Extracted
darkvision
acuweld.ddns.net
Targets
-
-
Target
009274965.lnk
-
Size
2KB
-
MD5
7f070dfbaa6893bb2effac0f2320a1d7
-
SHA1
293e7f6f6e70a0c7699215b3402dc5ff2bb2bfaa
-
SHA256
aeed70a3f936b699e93f18dfc5b4a582a6a08be7d52d8e6229754f96205aecb2
-
SHA512
720b2a90dd051160aeaa1a11a70433213b96f04e8d160c55c699f4fd6af7f1c07db61e110e684d9ce91ad79e987bd809497eb2d52ac2f3bd96cdb289c443b883
Score10/10-
Darkvision family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-